CN110473319A - A kind of door opening method of access control system, device, equipment and readable medium - Google Patents

A kind of door opening method of access control system, device, equipment and readable medium Download PDF

Info

Publication number
CN110473319A
CN110473319A CN201910693693.XA CN201910693693A CN110473319A CN 110473319 A CN110473319 A CN 110473319A CN 201910693693 A CN201910693693 A CN 201910693693A CN 110473319 A CN110473319 A CN 110473319A
Authority
CN
China
Prior art keywords
access control
control system
key
door
gate inhibition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910693693.XA
Other languages
Chinese (zh)
Inventor
张鹏
杨广学
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUHAN HUILIAN UNLIMITED TECHNOLOGY Co Ltd
Original Assignee
WUHAN HUILIAN UNLIMITED TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUHAN HUILIAN UNLIMITED TECHNOLOGY Co Ltd filed Critical WUHAN HUILIAN UNLIMITED TECHNOLOGY Co Ltd
Priority to CN201910693693.XA priority Critical patent/CN110473319A/en
Publication of CN110473319A publication Critical patent/CN110473319A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a kind of door opening methods of access control system, method includes: to work as to detect that gate inhibition's key issues request of opening the door to access control system, the verification information of gate inhibition's key is had previously been stored according to enabling request, and is recorded the sending time for request of opening the door and issued position;Judge whether the verification information of gate inhibition's key is correct;If judge that the verification information of gate inhibition's key is correct, inquiry gate inhibition's key issues the time record for request of opening the door to access control system and position records, and obtains query result;Judge whether the sending time of enabling request and sending position are abnormal according to query result;If judge to open the door the sending time requested and issue malposition, request user carries out the verifying of identity information, to determine whether opening gate system.The present invention when user needs opening gate system, judge gate inhibition's key verification information it is correct under the premise of, it is also necessary to verifying open the door request the sending time and issue position, with achieve the purpose that improve access control system safety.

Description

A kind of door opening method of access control system, device, equipment and readable medium
Technical field
This application involves field of computer technology more particularly to a kind of door opening method of access control system, device, equipment and Readable medium.
Background technique
Nowadays under the development at full speed of digital technology network technology, access control system has obtained swift and violent development, surmounts already Simple gateway and key management, plays huge in the Administrations such as work circumstances safe, personnel attendance management Effect.Access control system is developed on the basis of traditional mechanical door lock, and traditional mechanical door lock is only simple Mechanical device, no matter how reasonable structure design is, and how firm material is, and people can open it with by various means, nothing Method guarantees safety;In addition, key pretty troublesome in the management for entering and leaving many channel (as office, the hotel guest room) keys of people It loses or personnel's replacement will replace together lock & key, operate extremely not convenient, to solve the above-mentioned problems, just go out Show that safety is higher and the better access control system of convenience.
Mostly be direct verifying gate inhibition's key in the prior art to enter and leave access control system, if gate inhibition's key loss phase and by Other people utilize, and the safety of access control system hardly results in guarantee.
Summary of the invention
The purpose of the present invention is to solve the shortcomings of the prior art place, provides door opening method, the dress of a kind of access control system It sets, equipment and readable medium, to achieve the purpose that improve the safety of access control system.
The embodiment of the present application adopts the following technical solutions:
The embodiment of the present application provides a kind of door opening method of access control system, which comprises
It requests when detecting that gate inhibition's key issues to open the door to access control system, is had previously been stored according to the enabling request The verification information of gate inhibition's key, and record the sending time of the request of opening the door and issue position;
Judge whether the verification information of gate inhibition's key is correct;
If judge that the verification information of gate inhibition's key is correct, inquires gate inhibition's key and access control system sending is opened The time record and position record of door request, obtain query result;
Judge whether the sending time of the request of opening the door and sending position are abnormal according to the query result;
If judge the sending time of the request of opening the door and issue malposition, request user carries out identity information Verifying, to determine whether to open the access control system.
Optionally, it is described when detect gate inhibition's key to access control system issue open the door request, according to enablings request obtain Before taking the verification information for having previously been stored in gate inhibition's key, the method also includes:
It will be stored in the memory of gate inhibition's key by the verification information of access control system certification, wherein the verification information Including key code and the corresponding MAC Address of key code;
Judge whether the verification information of gate inhibition's key is correct, specifically includes:
Whether the key code and the corresponding MAC Address of key code for judging gate inhibition's key pass through the access control system Certification.
Optionally, after the verifying of the request user progress identity information, the method also includes:
Whether the identity information for judging the user matches with the identity information for being stored in the access control system;
It is user if judge that the identity information of the user is matched with the identity information for being stored in the access control system Open the access control system.
Optionally, which is characterized in that the identity information includes face characteristic, fingerprint characteristic, sound characteristic or user Number information.
The embodiment of the present application also provides a kind of door opener of access control system, described device includes:
Acquiring unit detects that gate inhibition's key issues request of opening the door to access control system for working as, is requested according to the enabling Obtain the verification information for having previously been stored in gate inhibition's key;
Recording unit, for recording the sending time of the request of opening the door and issuing position;
Whether judging unit, the verification information for judging gate inhibition's key are correct;
Query unit, if when for judging that the verification information of gate inhibition's key is correct, inquiring gate inhibition's key pair Access control system issues the time record and position record for request of opening the door, and obtains query result;
The judging unit is also used to judge according to the query result sending time of the request of opening the door and issues position It whether abnormal sets;
Authentication unit, if requesting user when for judging the sending time of the request of opening the door and issue malposition The verifying of identity information is carried out, to determine whether to open the access control system.
Optionally, described device further include:
Storage element, for the verification information for passing through access control system certification to be stored in the memory of gate inhibition's key, wherein The verification information includes key code and the corresponding MAC Address of key code;
The judging unit is specifically used for:
Whether the key code and the corresponding MAC Address of key code for judging gate inhibition's key pass through the access control system Certification.
Optionally, the judging unit is also used to judge the identity information of the user and is stored in the access control system Whether identity information matches;
Described device further include:
Opening unit, if for judging the identity information of the user and being stored in the identity information of the access control system When matching, the access control system is opened for user.
Optionally, the identity information includes face characteristic, fingerprint characteristic, sound characteristic or the number information of user.
The embodiment of the present application also provides a kind of computer-readable mediums, are stored thereon with computer-readable instruction, described Computer-readable instruction can be executed by processor to realize following methods:
It requests when detecting that gate inhibition's key issues to open the door to access control system, is had previously been stored according to the enabling request The verification information of gate inhibition's key, and record the sending time of the request of opening the door and issue position;
Judge whether the verification information of gate inhibition's key is correct;
If judge that the verification information of gate inhibition's key is correct, inquires gate inhibition's key and access control system sending is opened The time record and position record of door request, obtain query result;
Judge whether the sending time of the request of opening the door and sending position are abnormal according to the query result;
If judge the sending time of the request of opening the door and issue malposition, request user carries out identity information Verifying, to determine whether to open the access control system.
The embodiment of the present application also provides a kind of door-opening devices of access control system, which includes for storing computer journey The memory that sequence instructs and the processor for executing program instructions, wherein when the computer program instructions are held by the processor When row, triggers the equipment and executes following apparatus:
Acquiring unit detects that gate inhibition's key issues request of opening the door to access control system for working as, is requested according to the enabling Obtain the verification information for having previously been stored in gate inhibition's key;
Recording unit, for recording the sending time of the request of opening the door and issuing position;
Whether judging unit, the verification information for judging gate inhibition's key are correct;
Query unit, if when for judging that the verification information of gate inhibition's key is correct, inquiring gate inhibition's key pair Access control system issues the time record and position record for request of opening the door, and obtains query result;
The judging unit is also used to judge according to the query result sending time of the request of opening the door and issues position It whether abnormal sets;
Authentication unit, if requesting user when for judging the sending time of the request of opening the door and issue malposition The verifying of identity information is carried out, to determine whether to open the access control system.
The embodiment of the present application use at least one above-mentioned technical solution can reach it is following the utility model has the advantages that
The present invention when user needs opening gate system, judge gate inhibition's key verification information it is correct under the premise of, Need to verify open the door the sending time requested and sending position, also to achieve the purpose that improve access control system safety.
Detailed description of the invention
In order to illustrate more clearly of this specification embodiment or technical solution in the prior art, below will to embodiment or Attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only The some embodiments recorded in this specification, for those of ordinary skill in the art, in not making the creative labor property Under the premise of, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow diagram of the door opening method for the access control system that this specification embodiment one provides;
Fig. 2 is the flow diagram of the door opening method for the access control system that this specification embodiment two provides;
Fig. 3 is the structural schematic diagram of the door opener for the access control system that this specification embodiment three provides.
Specific embodiment
Mostly be direct verifying gate inhibition's key in the prior art to enter and leave access control system, if gate inhibition's key loss phase and by Other people utilize, and the safety of access control system hardly results in guarantee.
In order to solve above-mentioned technical problem, the present invention proposes following scheme, specifically real below in conjunction with the application It applies example and technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only this Apply for a part of the embodiment, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art exist Every other embodiment obtained under the premise of creative work is not made, shall fall in the protection scope of this application.
Fig. 1 is a kind of flow diagram of the door opening method for access control system that this specification embodiment one provides, the process Schematic diagram includes:
Step S101 is requested when detecting that gate inhibition's key issues to open the door to access control system, according to the enabling request The verification information of gate inhibition's key is had previously been stored in, and records the sending time of the request of opening the door and issues position.
Step S102 judges whether the verification information of gate inhibition's key is correct, if so, thening follow the steps S103;If it is not, Then illustrate that gate inhibition's key mismatches the access control system, alarm system can be set in access control system, once discovery mismatches Gate inhibition's key of the access control system is come when opening the access control system, it will sends a warning.
Step S103 inquires time record and position record that gate inhibition's key issues request of opening the door to access control system, Obtain query result.
Step S104 judges whether the sending time of the request of opening the door and sending position are different according to the query result Often, if so, thening follow the steps S105;If it is not, then opening gate system.
Step S105, request user carries out the verifying of identity information, to determine whether to open the access control system.
The present invention when user needs opening gate system, judge gate inhibition's key verification information it is correct under the premise of, Also need to verify open the door the sending time requested and sending position, if user loses gate inhibition's key and is obtained by other people, because Access control system has recorded time and the position that gate inhibition's key issues request of opening the door to access control system, other people are using gate inhibition's key The very big time that may issue request of opening the door to access control system with gate inhibition's key of record and position are different when spoon, access control system one When denier judges request time and malposition, it will request carries out the verifying of identity information, improves access control system peace to reach The purpose of full property.
Corresponding with above-described embodiment one, the embodiment of the present invention two additionally provides the door opening method of access control system, specific real The flow diagram of the door opening method of step access control system shown in Figure 2 is applied, which includes:
Step S201 will be stored in the memory of gate inhibition's key, wherein described by the verification information of access control system certification Verification information includes key code and the corresponding MAC Address of key code.
In the step S201 of this specification embodiment, gate inhibition's coding can be generated by encoder.MAC(Media Access Control, medium access control) address, for defining the position of the network equipment.MAC is integrated in network interface card, by 48bit 16 systems number composition, 0~23 bit digital be tissue unique identifier (organizationally unique, be identification The mark of LAN node).24~47 are distributed by producer oneself, wherein the 48th is multicast address flag bit.Network interface card Physical address is usually in the EPROM chip by network interface card manufacturer write-in network interface card, data in chip can by program into Row is erasable, and mark of really relying when what it was stored is transmission data issues the computer of data and receives the address of the host of data. That is, data transmission is to identify host by physical address, it is certain during the physical transfer of network bottom layer It is globally unique.
Step S202 is requested when detecting that gate inhibition's key issues to open the door to access control system, according to the enabling request It is stored in the verification information of gate inhibition's key, and records the sending time of the request of opening the door and issues position.
In the step S202 of this specification embodiment, gate inhibition's key can be IC card.Open the door request the sending time and Issue position can time for user's brush IC card door opening request and position, for example, user on Monday to Friday door opening request when Between at 9 points in the morning and 6 pm (user's working and next time can be expressed as), sending position is A (access control systems There are multiple doors, may include A, B, C, and user's door opening request is A, it can be understood as the user distance is compared with A It is closer), certainly, user may also be in other times door opening request or other positions door opening request, and access control system can ask at this time User is asked to carry out the verifying of identity information, wherein access control system can recorde the sending time for request of opening the door every time and issue position It sets, enabling request number of times most period can be defined as normally issuing the time, can be most by enabling request number of times Position is defined as normally issuing position, when there are other times or other positions door opening request, according to subsequent step, door Access control system will request the verifying of user's progress identity information.
Step S203 judges whether the verification information of gate inhibition's key is correct, if so, thening follow the steps S204;If it is not, Then illustrate that gate inhibition's key mismatches the access control system, alarm system can be set in access control system, once discovery mismatches Gate inhibition's key of the access control system is come when opening the access control system, it will sends a warning.
Judge whether the verification information of gate inhibition's key is correct, specifically includes:
Whether the key code and the corresponding MAC Address of key code for judging gate inhibition's key pass through the access control system Certification.
Step S204 inquires time record and position record that gate inhibition's key issues request of opening the door to access control system, Obtain query result.
Step S205 judges whether the sending time of the request of opening the door and sending position are different according to the query result Often, if so, thening follow the steps S206;If it is not, then opening gate system.
Step S206, request user carries out the verifying of identity information, to determine whether to open the access control system.
Step S207, judge the identity information of the user be stored in the access control system identity information whether phase Match, if so, S208 is thened follow the steps,;If it is not, then illustrate that gate inhibition's key mismatches the access control system, it can be by alarm system It sends a warning.
In the step S207 of this specification embodiment, identity information include face characteristic, fingerprint characteristic, sound characteristic or The number information of person user.When needing user's checking identity information can using face characteristic, fingerprint characteristic, sound characteristic and One of number information of user or various ways are verified, to ensure the accuracy of user identity.
Step S208 opens the access control system for user.
The present invention when user needs opening gate system, judge gate inhibition's key verification information it is correct under the premise of, Also need to verify open the door the sending time requested and sending position, if user loses gate inhibition's key and is obtained by other people, because Access control system has recorded time and the position that gate inhibition's key issues request of opening the door to access control system, other people are using gate inhibition's key The very big time that may issue request of opening the door to access control system with gate inhibition's key of record and position are different when spoon, access control system one When denier judges request time and malposition, it will request carries out the verifying of identity information, improves access control system peace to reach The purpose of full property.
Corresponding with above-described embodiment two, the embodiment of the present invention three additionally provides the door opener of access control system, specific real Apply the structural schematic diagram of the door opener of step access control system shown in Figure 3, the structural schematic diagram include: acquiring unit 1, Recording unit 2, judging unit 3, query unit 4, authentication unit 5, storage element 6 and opening unit 7.
Acquiring unit 1, which is used to work as, detects that gate inhibition's key issues request of opening the door to access control system, is requested according to the enabling Obtain the verification information for having previously been stored in gate inhibition's key.
Recording unit 2 is used to record the sending time of the request of opening the door and issues position.
Judging unit 3 is for judging whether the verification information of gate inhibition's key is correct.
If query unit 4 is for inquiring gate inhibition's key pair when judging that the verification information of gate inhibition's key is correct Access control system issues the time record and position record for request of opening the door, and obtains query result.
Judging unit 3 is also used to judge according to the query result sending time of the request of opening the door and issues position No exception.
If authentication unit 5 is used to judge the sending time of the request of opening the door and issues malposition, user is requested The verifying of identity information is carried out, to determine whether to open the access control system.
Storage element 6 is used to be stored in the memory of gate inhibition's key by the verification information of access control system certification, wherein The verification information includes key code and the corresponding MAC Address of key code.
Judging unit 3 is specifically used for:
Whether the key code and the corresponding MAC Address of key code for judging gate inhibition's key pass through the access control system Certification.
Judging unit 3 is also used to judge that the identity information of the user is with the identity information for being stored in the access control system It is no to match.
If opening unit 7 is for judging the identity information of the user and being stored in the identity information of the access control system When matching, the access control system is opened for user.
Identity information includes face characteristic, fingerprint characteristic, sound characteristic or the number information of user.
The present invention when user needs opening gate system, judge gate inhibition's key verification information it is correct under the premise of, Also need to verify open the door the sending time requested and sending position, if user loses gate inhibition's key and is obtained by other people, because Access control system has recorded time and the position that gate inhibition's key issues request of opening the door to access control system, other people are using gate inhibition's key The very big time that may issue request of opening the door to access control system with gate inhibition's key of record and position are different when spoon, access control system one When denier judges request time and malposition, it will request carries out the verifying of identity information, improves access control system peace to reach The purpose of full property.
The embodiment of the present application also provides a kind of computer-readable mediums, are stored thereon with computer-readable instruction, described Computer-readable instruction can be executed by processor to realize following methods:
It requests when detecting that gate inhibition's key issues to open the door to access control system, is had previously been stored according to the enabling request The verification information of gate inhibition's key, and record the sending time of the request of opening the door and issue position;
Judge whether the verification information of gate inhibition's key is correct;
If judge that the verification information of gate inhibition's key is correct, inquires gate inhibition's key and access control system sending is opened The time record and position record of door request, obtain query result;
Judge whether the sending time of the request of opening the door and sending position are abnormal according to the query result;
If judge the sending time of the request of opening the door and issue malposition, request user carries out identity information Verifying, to determine whether to open the access control system.
The embodiment of the present application also provides a kind of door-opening devices of access control system, which includes for storing computer journey The memory that sequence instructs and the processor for executing program instructions, wherein when the computer program instructions are held by the processor When row, triggers the equipment and executes following apparatus:
Acquiring unit detects that gate inhibition's key issues request of opening the door to access control system for working as, is requested according to the enabling Obtain the verification information for having previously been stored in gate inhibition's key;
Recording unit, for recording the sending time of the request of opening the door and issuing position;
Whether judging unit, the verification information for judging gate inhibition's key are correct;
Query unit, if when for judging that the verification information of gate inhibition's key is correct, inquiring gate inhibition's key pair Access control system issues the time record and position record for request of opening the door, and obtains query result;
The judging unit is also used to judge according to the query result sending time of the request of opening the door and issues position It whether abnormal sets;
Authentication unit, if requesting user when for judging the sending time of the request of opening the door and issue malposition The verifying of identity information is carried out, to determine whether to open the access control system.
The present invention when user needs opening gate system, judge gate inhibition's key verification information it is correct under the premise of, Also need to verify open the door the sending time requested and sending position, if user loses gate inhibition's key and is obtained by other people, because Access control system has recorded time and the position that gate inhibition's key issues request of opening the door to access control system, other people are using gate inhibition's key The very big time that may issue request of opening the door to access control system with gate inhibition's key of record and position are different when spoon, access control system one When denier judges request time and malposition, it will request carries out the verifying of identity information, improves access control system peace to reach The purpose of full property.
In the 1990s, the improvement of a technology can be distinguished clearly be on hardware improvement (for example, Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So And with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit. Designer nearly all obtains corresponding hardware circuit by the way that improved method flow to be programmed into hardware circuit.Cause This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device (Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate Array, FPGA)) it is exactly such a integrated circuit, logic function determines device programming by user.By designer Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, designs and makes without asking chip maker Dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " is patrolled Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development, And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language (Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many kind, such as ABEL (Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL (Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language) etc., VHDL (Very-High-Speed is most generally used at present Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also answer This understands, it is only necessary to method flow slightly programming in logic and is programmed into integrated circuit with above-mentioned several hardware description languages, The hardware circuit for realizing the logical method process can be readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing The computer for the computer readable program code (such as software or firmware) that device and storage can be executed by (micro-) processor can Read medium, logic gate, switch, specific integrated circuit (Application Specific Integrated Circuit, ASIC), the form of programmable logic controller (PLC) and insertion microcontroller, the example of controller includes but is not limited to following microcontroller Device: ARC625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320 are deposited Memory controller is also implemented as a part of the control logic of memory.It is also known in the art that in addition to Pure computer readable program code mode is realized other than controller, can be made completely by the way that method and step is carried out programming in logic Controller is obtained to come in fact in the form of logic gate, switch, specific integrated circuit, programmable logic controller (PLC) and insertion microcontroller etc. Existing identical function.Therefore this controller is considered a kind of hardware component, and to including for realizing various in it The device of function can also be considered as the structure in hardware component.Or even, it can will be regarded for realizing the device of various functions For either the software module of implementation method can be the structure in hardware component again.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment The combination of equipment.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this The function of each unit can be realized in the same or multiple software and or hardware when application.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with In the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal Replacement, improvement etc., should be included within the scope of the claims of this application.

Claims (10)

1. a kind of door opening method of access control system, which is characterized in that the described method includes:
It requests, is had previously been stored according to the enabling request described when detecting that gate inhibition's key issues to open the door to access control system The verification information of gate inhibition's key, and record the sending time of the request of opening the door and issue position;
Judge whether the verification information of gate inhibition's key is correct;
If judge that the verification information of gate inhibition's key is correct, inquires gate inhibition's key and access control system sending enabling is asked The time record and position record asked, obtain query result;
Judge whether the sending time of the request of opening the door and sending position are abnormal according to the query result;
If judge the sending time of the request of opening the door and issue malposition, request user carries out testing for identity information Card, to determine whether to open the access control system.
2. the door opening method of access control system according to claim 1, which is characterized in that described to detect gate inhibition's key pair Access control system issue open the door request, according to the enabling request have previously been stored in gate inhibition's key verification information it Before, the method also includes:
It will be stored in the memory of gate inhibition's key by the verification information of access control system certification, wherein the verification information includes Key code and the corresponding MAC Address of key code;
Judge whether the verification information of gate inhibition's key is correct, specifically includes:
Whether the key code and the corresponding MAC Address of key code for judging gate inhibition's key are recognized by the access control system Card.
3. the door opening method of access control system according to claim 1, which is characterized in that the request user carries out identity letter After the verifying of breath, the method also includes:
Whether the identity information for judging the user matches with the identity information for being stored in the access control system;
If judge that the identity information of the user is matched with the identity information for being stored in the access control system, opened for user The access control system.
4. the door opening method of access control system according to claim 1, which is characterized in that the identity information includes face spy Sign, fingerprint characteristic, sound characteristic or the number information of user.
5. a kind of door opener of access control system, which is characterized in that described device includes:
Acquiring unit detects that gate inhibition's key issues request of opening the door to access control system for working as, according to the enabling request Have previously been stored in the verification information of gate inhibition's key;
Recording unit, for recording the sending time of the request of opening the door and issuing position;
Whether judging unit, the verification information for judging gate inhibition's key are correct;
Query unit, if when for judging that the verification information of gate inhibition's key is correct, inquiring gate inhibition's key to gate inhibition System issues the time record and position record for request of opening the door, and obtains query result;
The judging unit is also used to judge according to the query result sending time of the request of opening the door and issues position No exception;
Authentication unit, if request user carries out when for judging the sending time of the request of opening the door and issue malposition The verifying of identity information, to determine whether to open the access control system.
6. the door opener of access control system according to claim 5, which is characterized in that described device further include:
Storage element, for the verification information for passing through access control system certification to be stored in the memory of gate inhibition's key, wherein described Verification information includes key code and the corresponding MAC Address of key code;
The judging unit is specifically used for:
Whether the key code and the corresponding MAC Address of key code for judging gate inhibition's key are recognized by the access control system Card.
7. the door opener of access control system according to claim 5, which is characterized in that the judging unit is also used to judge Whether the identity information of the user matches with the identity information for being stored in the access control system;
Described device further include:
Opening unit, if for judging that the identity information of the user is matched with the identity information for being stored in the access control system When, the access control system is opened for user.
8. the door opener of access control system according to claim 5, which is characterized in that the identity information includes face spy Sign, fingerprint characteristic, sound characteristic or the number information of user.
9. a kind of computer-readable medium, is stored thereon with computer-readable instruction, the computer-readable instruction can be processed Device is executed to realize method described in any one of Claims 1-4.
10. a kind of door-opening devices of access control system, which includes memory for storing computer program instructions and is used for The processor executed program instructions, wherein when the computer program instructions are executed by the processor, trigger the equipment right of execution Benefit requires the described in any item devices of 5-8.
CN201910693693.XA 2019-07-30 2019-07-30 A kind of door opening method of access control system, device, equipment and readable medium Pending CN110473319A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910693693.XA CN110473319A (en) 2019-07-30 2019-07-30 A kind of door opening method of access control system, device, equipment and readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910693693.XA CN110473319A (en) 2019-07-30 2019-07-30 A kind of door opening method of access control system, device, equipment and readable medium

Publications (1)

Publication Number Publication Date
CN110473319A true CN110473319A (en) 2019-11-19

Family

ID=68509872

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910693693.XA Pending CN110473319A (en) 2019-07-30 2019-07-30 A kind of door opening method of access control system, device, equipment and readable medium

Country Status (1)

Country Link
CN (1) CN110473319A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111292448A (en) * 2020-02-20 2020-06-16 深圳市春晖信档案技术服务有限公司 File cabinet, centralized file management terminal and file management method
CN113132106A (en) * 2019-12-30 2021-07-16 中国移动通信集团山西有限公司 User identity recognition system
CN113392392A (en) * 2021-03-31 2021-09-14 中富通集团股份有限公司 CTID-based intelligent terminal verification method, intelligent door lock and access control system
CN116863576A (en) * 2023-09-04 2023-10-10 民航成都电子技术有限责任公司 Method, system and medium for synchronizing passage information of aircrew

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069874A (en) * 2015-07-28 2015-11-18 北京航空航天大学 Mobile internet voiceprint entrance guard system and implementation method thereof
CN105069876A (en) * 2015-08-04 2015-11-18 珠海格力电器股份有限公司 Control method and system for intelligent access control
CN108230525A (en) * 2018-03-27 2018-06-29 河南省国泰安信息技术有限公司 Access control management method and gate inhibition management apparatus
CN109830022A (en) * 2019-02-28 2019-05-31 重庆工商职业学院 Intelligent estate management system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069874A (en) * 2015-07-28 2015-11-18 北京航空航天大学 Mobile internet voiceprint entrance guard system and implementation method thereof
CN105069876A (en) * 2015-08-04 2015-11-18 珠海格力电器股份有限公司 Control method and system for intelligent access control
CN108230525A (en) * 2018-03-27 2018-06-29 河南省国泰安信息技术有限公司 Access control management method and gate inhibition management apparatus
CN109830022A (en) * 2019-02-28 2019-05-31 重庆工商职业学院 Intelligent estate management system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113132106A (en) * 2019-12-30 2021-07-16 中国移动通信集团山西有限公司 User identity recognition system
CN113132106B (en) * 2019-12-30 2023-08-18 中国移动通信集团山西有限公司 User identity recognition system
CN111292448A (en) * 2020-02-20 2020-06-16 深圳市春晖信档案技术服务有限公司 File cabinet, centralized file management terminal and file management method
CN113392392A (en) * 2021-03-31 2021-09-14 中富通集团股份有限公司 CTID-based intelligent terminal verification method, intelligent door lock and access control system
CN116863576A (en) * 2023-09-04 2023-10-10 民航成都电子技术有限责任公司 Method, system and medium for synchronizing passage information of aircrew
CN116863576B (en) * 2023-09-04 2023-12-22 民航成都电子技术有限责任公司 Method, system and medium for synchronizing passage information of aircrew

Similar Documents

Publication Publication Date Title
CN110473319A (en) A kind of door opening method of access control system, device, equipment and readable medium
CN107392040B (en) A kind of method and device of common recognition verifying
EP3531656B1 (en) Block chain-based data processing method and device
CN107562775A (en) A kind of data processing method and equipment based on block chain
US10432622B2 (en) Securing biometric data through template distribution
CN110009388A (en) Equipment leasing method, apparatus, equipment and storage medium
CN108881120A (en) A kind of data processing method and equipment based on block chain
CN110162981A (en) Data processing method and device
CN108055132A (en) The method, apparatus and equipment of a kind of service authorization
CN110335036A (en) Processing, generation method and the device of off-line graphical code
CN110032880A (en) Record screen evidence collecting method, system and electronic equipment based on block chain
CN109993530A (en) A kind of virtual resource management method, device and electronic equipment
CN108959341A (en) A kind of method, device and equipment that data are synchronous
CN107679700A (en) Business flow processing method, apparatus and server
CN110196889A (en) Data processing method, device, electronic equipment and storage medium
TWI788662B (en) Security authentication method, method for training security authentication model, security authentication device, training device for security authentication model, electronic device, and computer-readable storage medium
CN109460643A (en) A kind of smart machine control method, device and equipment
CN110222531A (en) A kind of method, system and equipment accessing database
CN107018174A (en) A kind of method, device and the transaction processing system of blocking system service processing
CN109241026A (en) The method, apparatus and system of data management
CN110443917A (en) Detection method, device and the equipment that electronic switch door gear and electronic cutting are closed the door
CN109240848A (en) A kind of data object tag generation method and device
CN109922298A (en) Meeting room monitoring method and device
CN108074024A (en) Risk Identification Method, apparatus and system
CN109583190A (en) The method and apparatus of monitoring process

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191119